Technical Specifications Manual for Online Testing For Technology Coordinators 2014–2015 Published February 23, 2015 Prepared by the American Institutes for Research® 1 Technical Specifications Manual 2014–2015 Table of Contents Introduction to the Technical Specifications Manual .............................................................................. 1 Manual Content ........................................................................................................................................ 1 Other Resources ....................................................................................................................................... 1 Section I. Network and Internet Requirements ........................................................................................ 3 General Requirements.............................................................................................................................. 3 Common Network Performance Bottlenecks............................................................................................ 3 Bandwidth ............................................................................................................................................. 4 Determining Bandwidth Requirements ............................................................................................ 5 Total Number of Students Simultaneously Testing .......................................................................... 5 Size of the Test Content................................................................................................................... 5 Secure Browser Installation .................................................................................................................. 6 Network Configuration .............................................................................................................................. 6 Protocols ............................................................................................................................................... 6 Domain Name Resolution..................................................................................................................... 6 Content Filter, Firewalls, and Proxy Servers ........................................................................................ 6 Quality of Service (QoS)/Traffic Shaping ............................................................................................. 7 Certificate Revocation List .................................................................................................................... 7 Symantec Recommendations .......................................................................................................... 7 Wireless Networking ................................................................................................................................. 8 Wireless Access Points ........................................................................................................................ 8 Recommendations on the optimal number of student workstations per wireless connection ......... 8 Network Diagnostic Tools ......................................................................................................................... 9 AIR’s Network/Bandwidth Diagnostic Tool ........................................................................................... 9 Microsoft Windows Specific Tools ........................................................................................................ 9 Mac OS X Specific Tools .................................................................................................................... 10 Multi‐Platform Tools ............................................................................................................................ 10 Section II. General Software Requirements ........................................................................................... 11 Requirements for All Systems ................................................................................................................ 11 Enabling Pop-Up Windows ................................................................................................................. 11 Flash Information ................................................................................................................................ 12 Windows Requirements .......................................................................................................................... 13 Disabling Fast User Switching ............................................................................................................ 13 Disabling Fast User Switching in Windows XP .............................................................................. 13 Disabling Fast User Switching in Windows 7 ................................................................................. 13 Disabling Fast User Switching in Windows 8.0 and 8.1 ................................................................. 15 ii Technical Specifications Manual 2014–2015 Enabling Web Fonts in Internet Explorer 10 and 11 .......................................................................... 17 Installing Windows Media Pack for Windows 8.1 N and KN .............................................................. 18 Mac OS X Requirements ........................................................................................................................ 18 Disabling Spaces ................................................................................................................................ 19 Function Keys and Application Launches .......................................................................................... 20 Disabling Spaces and Application Launches from the Command Line ............................................. 21 Disabling Spaces and Application Launches on Remote Machines .................................................. 21 Linux Requirements ................................................................................................................................ 22 Installing Festival and Sound eXchange (SoX) Software ................................................................... 22 Mobile Requirements .............................................................................................................................. 22 iOS Requirements .............................................................................................................................. 23 Guided Access ............................................................................................................................... 23 Enabling Guided Access ................................................................................................................ 23 Configuring Using Autonomous Single App Mode ............................................................................. 24 Overview of Autonomous Single App Mode and the Secure Testing Environment ...................... 24 Step 1: Creating a Mobile Device Management Profile ................................................................. 25 Step 1a (Optional): Restricting Features in iOS 8.1.3 .................................................................... 26 Step 2: Creating a Supervisory Profile ........................................................................................... 27 Step 3: Placing iPads in Autonomous Single App Mode ............................................................... 29 Android Requirements ........................................................................................................................ 32 Enabling the Secure Browser Keyboard ........................................................................................ 32 Chrome OS Requirements ................................................................................................................. 34 Google Documentation .................................................................................................................. 34 Section III. Text-to-Speech Requirements .............................................................................................. 36 Overview of Text-to-Speech ................................................................................................................... 36 Using Text-to-Speech ......................................................................................................................... 36 How the Secure Browsers Work With Voice Packs ........................................................................... 36 Desktop Secure Browsers.............................................................................................................. 36 Mobile Secure Browsers ................................................................................................................ 37 About NeoSpeech™ Voice Packs for Windows ................................................................................. 37 Windows Text-to-Speech Settings ......................................................................................................... 38 Mac OS X Text-to-Speech Settings ........................................................................................................ 39 Linux Text-to-Speech Settings ............................................................................................................... 40 Voice Packs Recognized by Desktop Secure Browsers ........................................................................ 41 Windows ............................................................................................................................................. 41 Mac OS X ........................................................................................................................................... 42 Linux ................................................................................................................................................... 43 iii Technical Specifications Manual 2014–2015 Appendix A. Systems and URLs Provided by AIR ................................................................................ 44 Non-Testing Sites ................................................................................................................................... 44 Testing Sites ........................................................................................................................................... 44 TA and Student Testing Sites ............................................................................................................. 44 Appendix B. Technology Coordinator Checklist ................................................................................... 45 Appendix C. User Support ....................................................................................................................... 46 iv Technical Specifications Manual 2014–2015 List of Tables Table 1. Key Symbols and Elements ............................................................................................................ 1 Table 2. Average Bandwidth Used by Secure Browser for Testing .............................................................. 4 Table 3. Ports for Test Delivery System ....................................................................................................... 6 Table 4. Wireless Access Points ................................................................................................................... 8 Table 5. Flash Requirements ...................................................................................................................... 12 Table 6. Packages that Include Supported Voice Packs on Linux Distributions ........................................ 40 Table 7. Voice Packs Recognized by Secure Browsers—Windows........................................................... 41 Table 8. Voice Packs Recognized by Secure Browsers—Mac OS X ......................................................... 42 Table 9. Voice Packs Recognized by Secure Browsers—Linux................................................................. 43 v Technical Specifications Manual 2014–2015 Introduction to the Technical Specifications Manual This manual provides information about supported operating systems and related requirements, network and Internet requirements, general hardware and software requirements, and text-to-speech information. Manual Content Below is a brief description of each section in this manual, as well as common symbols and elements used throughout the document. Section I, Network and Internet Requirements, provides information about bandwidth, networking, and available diagnostic tools. Section II, General Software Requirements, outlines required configurations for desktop operating systems (Windows, Mac, and Linux). Section III, Text-to-Speech Requirements, contains information for ensuring text-to-speech settings are enabled on desktop operating systems. Information about voice packs for Windows is also included. The appendices contain URLs for systems provided by the American Institutes for Research and a checklist for system administrators and technology coordinators. Table 1. Key Symbols and Elements Element Description Warning: This symbol accompanies important information regarding actions that may cause fatal errors. Alert: This symbol accompanies important information regarding a task that may cause minor errors. Note: This symbol accompanies additional information that may be of interest. text Bold text indicates a link or button that is clickable. Tip: This symbol accompanies suggestions that may be useful. Other Resources For information about installing secure browsers, refer to the Secure Browser Installation Manual. 1 Technical Specifications Manual 2014–2015 For information about operating system and general hardware requirements, refer to the Online System Requirements for Ohio Science and Social Studies Tests. The above resources as well as test administration manuals and user guides for other systems are available on the OCBA (Ohio Computer Based Assessments) portal (http://oh.portal.airast.org/ocba/). 2 Technical Specifications Manual 2014–2015 Section I. Network and Internet Requirements The information in this section provides an overview of network and Internet configuration requirements and available diagnostic tools. General Requirements A stable, high-speed (wired or wireless) Internet connection is required for online testing. The response time for each assessment depends on the reliability and speed of your school’s Internet network. If your Internet connection is not working or stops working, students will need to complete their tests at a later time or on another day. Any answers they have already submitted will be saved, and students will resume their tests where they left off. For the online testing applications to work properly, you may need to verify your network settings. If you are not sure whether your network is properly configured or you have questions, contact your network administrator or technology specialist to find the right contact person in your area. You may also contact the Ohio Help Desk. Network configuration settings should include the following: Content filters, firewalls, and proxy servers should be configured to allow traffic on the protocols and to the servers listed below. Session timeouts on proxy servers and other devices should be set to values greater than the average scheduled testing time. If testing sessions are scheduled for 60 minutes, consider session timeouts of 65–70 minutes. This will help limit network interruptions during testing. Data cannot be cached. If your client network uses any devices that perform traffic shaping, packet prioritization, or Quality of Service, the URLs for the systems provided by AIR should be given a high priority to guarantee the highest level of performance. For information about URLs that should be open or whitelisted, refer to Systems and URLs Provided by AIR. Common Network Performance Bottlenecks All network communications are accomplished using the IP protocol suite. The local area network (LAN) must be able to route IP traffic to and from the Internet. 3 Technical Specifications Manual 2014–2015 The Test Delivery System is delivered directly through the Internet. Students must access their tests using the appropriate secure browser. For testing to take place, all workstations where tests will be administered must have reliable Internet connectivity. In general, the performance of the Test Delivery System will depend on a number of factors, including bandwidth, total number of students simultaneously testing, size of test content, secure browser installation, proxy server (if used), and the wireless networking solution (if used). Bandwidth Bandwidth is the measure of the capacity of a network. Utilized bandwidth measures the amount of data traveling across the network at a given point in time. Bandwidth performance can be affected on either the internal network (LAN) traffic or the Internet traffic from the router. Regardless of hardware or network topology, the LAN should be analyzed to determine the potential for traffic bottlenecks. The following table displays the estimated average bandwidth used by the secure browser for testing. (Note that there is a one-time exception to these averages; during initial secure browser startup, the load can be greater, leading to a longer load time.) All numbers provided are based on rigorous testing using Wireshark. Table 2. Average Bandwidth Used by Secure Browser for Testing Number of Students Testing Concurrently in School/Building Average Estimated Bandwidth Consumed During Subsequent Startup of Secure Browsera Average Estimated Bandwidth Consumed During Testingb 1 8K bits/second 5–15K bits/second 50 400K bits/second 250–750K bits/second (0.25–0.75M bits/second) 100 800K bits/second 500–1500K bits/second (0.5–1.5M bits/second) a Bandwidth consumed when opening the secure browser and accessing an assessment for the first time is significantly higher than when opening the secure browser and accessing an assessment subsequently. The reason for this is that the initial launch of the secure browser downloads non-secure cacheable content (not test content) that can be immediately accessed upon opening the secure browser at a later time. Bandwidth will vary during a student’s testing experience, as some pages contain low-bandwidth content, such as multiple-choice items, and other pages contain higher-bandwidth content, such as animations. Consequently, the estimated average values in this column are based on computing averages from multiple assessments and subjects. b 4 Technical Specifications Manual 2014–2015 Determining Bandwidth Requirements Schools need to factor the bandwidth requirements of each assessment along with all other non-testing-related Internet traffic in order to determine how many concurrent test sessions their Internet connections can support. Some assessments include animations and interactive item types. These may increase the bandwidth required, but the bandwidth should not exceed the peak usage experienced when the test initially loads. We encourage you to run the diagnostics on your network to determine how many students you can reasonably test at one time. For information about running diagnostics on your network, refer to the Network Diagnostic Tools section. For wired networks, internal bandwidth is typically not a problem, because new switches generally operate at speeds of between 100M bits per second and 1000M bits per second. However, LAN performance can be hindered in cases where hubs are used instead of switches. A hub device will allow broadcast signals from various network devices to propagate across the network, potentially saturating the network and causing traffic competition and/or collisions of data. For Internet networks, the most common bottleneck is the ISP’s router connection, which typically operates at speeds of between 1.5M bits per second and 100M bits per second. Network administrators should spend time prior to test administration determining whether their Internet infrastructure has the capacity to accommodate current and future growth. Analyzing Infrastructure Determining whether infrastructure is capable of current and future growth involves a number of steps, including but not limited to: (1) the analysis of the current number of users; (2) current day-to-day Internet bandwidth statistics; and (3) the desired response time for applications. Total Number of Students Simultaneously Testing As the number of students testing at one time increases, competition for network bandwidth increases. Network bandwidth resembles highway traffic; as the number of cars traveling on a given road increases, the speed of traffic flow decreases. Size of the Test Content The size of the test is determined by two factors: (1) the number of items on the test and (2) the average size of each item. The more items a test contains and the larger the average size of a test item, the higher the bandwidth requirement for a given test. For example, ELA tests typically deliver all items associated with a passage at one time, and this may slightly impact the bandwidth for these tests. 5 Technical Specifications Manual 2014–2015 Secure Browser Installation The recommended installation of the secure browser is local installation on each individual testing workstation. It is possible to install the secure browser on a network or shared drive and then have the testing workstations run the secure browser from that drive, but there may be some performance impacts under this configuration. There will be competition for network bandwidth, and the network or shared disk drive will also be subject to some resource competition as there will be multiple clients reading from the network drive, thus slowing the overall processing speed. See the Secure Browser Installation Manual for guidance. Network Configuration Protocols All communication with the Test Delivery System takes place over the following Internet port/protocol combinations. Please ensure that the following ports are open for these systems. Table 3. Ports for Test Delivery System Port/Protocol Purpose 80/tcp HTTP (initial connection only) 443/tcp HTTPS (secure connection) Domain Name Resolution All system URLs must be resolvable by all client hosts attempting to connect to the Test Delivery System. This means that the client workstations should be able to convert the friendly names (URLs) to their corresponding IP address by requesting the information from the DNS server. For a list of URLs, refer to Appendix A, Systems and URLs Provided by AIR. Content Filter, Firewalls, and Proxy Servers Content filters, firewalls, and proxy servers should be configured to allow traffic on the protocols listed above to the applications’ servers. In addition, session timeouts on proxy servers and other devices should be set to values greater than the average duration it takes a student to participate in a test session or complete a given test. For example, if your school determines that students will test in 75-minute sessions, then consider setting the session timeout to 80 or 85 minutes. System administrators will need to make sure that information is not blocked in their content filters and that data are not cached. The URLs listed in Appendix A should be open for these systems. 6 Technical Specifications Manual 2014–2015 Quality of Service (QoS)/Traffic Shaping If the client network utilizes any devices that perform traffic shaping, packet prioritization, or Quality of Service, the URLs should be given a high level of priority in order to guarantee the highest level of performance. Certificate Revocation List Schools should open their firewalls to allow the secure browser to check the certificate authenticity at Symantec Certificate Revocation List (CRL) at http://crl.verisign.com/. Symantec Recommendations Note: The following information was provided by Symantec. It is strongly recommended that any firewall policies and/or access control devices use URLs and not IP addresses. Symantec can change these IP addresses at any time without notification. If possible, white list the following entries on your firewall policies and/or access control devices to ensure seamless access to our Online Certificate Status Protocol (OCSP) services: *.thawte.com *.geotrust.com *.ws.symantec.com Note: If white listing wildcard entries is not permitted, you can white list the following specific fully qualified domain names (FQDNs): oscp.ws.symantec.com oscp.geotrust.com oscp.thawte.com If your firewall is configured to allow only a certain set of IP addresses to be accessed from your network, you will need to take the following actions: Get the full list of IP addresses for the new sites. Complete a short form and then you will gain access to the site list. Install or add the IP addresses to your existing list. Do not replace the old IP addresses and do not delete your existing rules for Symantec OCSP IP addresses. 7 Technical Specifications Manual 2014–2015 Wireless Networking Over the past several years, there have been several revisions to wireless networking technology. 802.11n is the fastest and most recent IEEE wireless standard, with a throughput of up to 300M bits per second. 802.11g has a theoretical throughput of up to 54M bits per second. 802.11b has a theoretical throughput of 11M bits per second. Wireless Security Due to the sensitivity of test-related data, it is highly recommended that wireless traffic use WPA2/AES data encryption. Because encryption/decryption is part of the data exchange process, there may be a slight decrease in the overall speed of the network. A properly configured wireless network should provide adequate bandwidth for the testing applications. Wireless Access Points AIR recommends that schools maintain a ratio of wireless systems to wireless access points (WAPs) of no more than 20 to 1. Typically, the test performance begins to deteriorate after that threshold has been reached. In some instances, older WAPs may also see performance degradation when more than 15 devices are concurrently connected. Recommendations on the optimal number of student workstations per wireless connection The optimal (or maximum) number of student workstations (computers and tablets) supported by a single wireless connection will depend on the type of networking standard being used for the connection. The two most common networking standards are 802.11g (54Mbps) and the newer and faster standard, 802.11n (300Mbps). Both the access point, which emits the wireless signal, and the computer’s wireless card, which receives the signal, will use one of these two standards. The recommendations in Table 4 are based on the standard in use. Table 4. Wireless Access Points 802.11g Access Point 802.11n Access Point 802.11g Wireless Cards 20 workstations or devices 40 workstations or devices 802.11n Wireless Cards 20 workstations or devices 40 workstations or devices Mix of 802.11g and 802.11n Wireless Cards 20 workstations or devices 40–50 workstations or devices (depending on the ratio of wireless cards used) 8 Technical Specifications Manual 2014–2015 Note: Refer to your WAP documentation for specific recommendations and guidelines. Networks using wireless standards other than 802.11g and 802.11n may also work, but early testing using the practice tests is recommended. Network Diagnostic Tools A performance analysis of the LAN/Internet infrastructure is recommended in order to identify any bottlenecks that may impact test performance. Identifying the diagnostic tool most appropriate for a network depends on the testing operating system, the network administrator’s knowledge base and the desired level of network analysis. A number of network diagnostic tools are available. These include the following: AIR’s Network/Bandwidth Diagnostic Tool AIR provides a diagnostic tool that can be directly accessed from the student practice test login page. 1. On the practice test login page, click the Run Diagnostics link. The Diagnostic Screen page will display. 2. In the Network Diagnostics section, select a test. 3. Select the approximate number of students who may take that test at one time. 4. Click the Run Network Diagnostics Tests button. The results will display your current upload and download speed as well as a general idea of whether you can reliably test the given number of students (the number entered in step 3). You may want to run this test several times throughout the day to verify that your upload and download speeds remain relatively consistent. Microsoft Windows Specific Tools PRTG Traffic Grapher PRTG (www.paessler.com/prtg) monitors bandwidth usage and other network parameters via Simple Network Management Protocol (SNMP). It also contains a built‐in packet sniffer. A freeware version is available. NTttcp NTttcp (www.microsoft.com/whdc/device/network/TCP_tool.mspx) is a multithreaded, asynchronous application that sends and receives data between two or more endpoints and reports the network performance for the duration of the transfer. 9 Technical Specifications Manual 2014–2015 Pathping Pathping is a network utility included in the Windows operating system. It combines the functionality of Ping with that of Traceroute (Windows filename: tracert) by providing details of the path between two hosts and Ping‐like statistics for each node in the path based on samples taken over a time period. Mac OS X Specific Tools Network Utility.app This tool is built into Mac OS X software. Multi‐Platform Tools Wireshark Wireshark (www.wireshark.org) is a network protocol analyzer. It has a large feature set and runs on most computing platforms including Windows, OS X, Linux, and UNIX. TCPDump TCPdump (http://sourceforge.net/projects/tcpdump) is a common packet sniffer that runs under the command line and is compatible with most major operating systems (UNIX, Linux, Mac OS X). It allows the user to intercept and display data packets being transmitted or received over a network. A Windows port WinDump is also available (www.winpcap.org/windump/). Ping, NSLookup, Netstat, Traceroute This is a set of standard UNIX network utilities. Versions of these utilities are included in all major operating systems (UNIX, Linux, Windows, and Mac OS X). Iperf Iperf (http://sourceforge.net/projects/iperf/) measures maximum TCP bandwidth, allowing the tuning of various parameters and User Datagram Protocol (UDP) characteristics. Iperf reports bandwidth, delay jitter, and datagram loss. 10 Technical Specifications Manual 2014–2015 Section II. General Software Requirements In addition to installing the secure browser, you may need to adjust operating system settings or install additional software on students’ machines that are used for testing. Requirements for All Systems Enabling Pop-Up Windows All systems provided by AIR except for the secure browser require pop-up windows to be enabled. These systems use pop-up windows to provide warning or error messages to users. Navigate to the appropriate menu option to globally disable pop-up blockers. To globally enable pop-up windows: Firefox: Tools > Options > Content > clear Block pop-up windows. Google Chrome: Menu > Settings > Show advanced settings (at the bottom of the screen) > Privacy > Content Settings > Pop-ups > mark Allow all sites to show pop-ups. Chrome browser on Android tablets: Menu > Settings > Advanced > Content Settings > Block pop-ups > clear checkbox. Internet Explorer: Tools > Pop-up Blocker > Turn Off Pop-up Blocker. Safari: Application Menu (Safari) > clear Block Pop-Up Windows. iOS Safari: Settings > Safari > Block Pop-ups (toggle to off mode) 11 Technical Specifications Manual 2014–2015 If you want only allow certain sites to have pop-up windows, you can add exceptions and whitelist AIR’s systems. For URLs and information about whitelisting, refer to Appendix A, Systems and URLs Provided by AIR. To add exceptions to the pop-up blocker: Firefox: Tools > Options > Content > click Exceptions. Enter the URL or whitelist protocol for each system. Google Chrome: Menu > Settings > Show advanced settings (at the bottom of the screen) > Privacy > Content Settings > Pop-ups > click Manage Exceptions. Enter the URL or whitelist protocol for each system and select Allow. This option is not available for the Chrome browser on Android tablets. Internet Explorer: Tools > Pop-up Blocker > Pop-up Blocker Settings. Enter the URL or whitelist protocol for each system and click Add. Configure other settings as desired. Safari and iOS Safari: N/A Flash Information Some test items include animations. Animations can be rendered in Flash or HTML5. Table 5 lists the requirements for installing Flash on the testing computers. Table 5. Flash Requirements Browser Flash Requirement Secure browser 7.0 and later Renders using HTML5, no need for additional installation. Secure browser 6.5 Flash bundled in the secure browser installation pack. Secure TestApp Renders using HTML5, no need for additional installation. Commercial browser* with HTML5 Renders using HTML5, no need for additional installation. Commercial browser* before HTML5 Install Flash for your operating system, or install the Flash plug-in for the browser. *Commercial browsers—the versions of Internet Explorer, Firefox, Chrome, Safari, and mobile browsers listed in the Online System Requirements for Ohio Science and Social Studies Tests. 12 Technical Specifications Manual 2014–2015 Windows Requirements This section contains information specific to Windows users. Disabling Fast User Switching Microsoft Windows (XP, Vista, 7, 8.0, and 8.1) allows computers to be configured to allow multiple users to log in to a computer without requiring one user to log out before another logs in. This feature is called “Fast User Switching” and presents a test security risk if it is enabled. If a student can access multiple user accounts from a single computer, you are required to disable the Fast User Switching function. Instructions for disabling Fast User Switching in Windows XP, 7, and 8 follow. Disabling Fast User Switching in Windows XP 1. Click Start, click Control Panel, then click User Accounts. 2. Click Change the Way Users Log On or Off. a. Mark the Use the Welcome Screen checkbox. b. Clear the Use Fast User Switching checkbox. 3. Click Apply Options. *Please note that Fast User Switching is not an option if joined to a domain. Disabling Fast User Switching in Windows 7 The instructions for disabling Fast User Switching in Vista are very similar. 13 Technical Specifications Manual 2014–2015 Option A: Access the Group Policy Editor 1. Click Start, type gpedit.msc in the Start Search dialog box, and press Enter. 2. Navigate to the following location: Local Computer Policy > Computer Configuration > Administrative Templates > System > Logon. 3. Click Hide entry points for Fast User Switching, select Enabled, and click OK. 4. Close the Fast User Switching window. 5. Close the Local Group Policy Editor window. Note: Because the Group Policy Editor does not exist in certain editions of Windows Vista, you may need to configure these settings via the registry if the above method is unavailable. See below for registry instructions. 14 Technical Specifications Manual 2014–2015 Option B: Access the Registry 1. Click Start, type regedit.exe in the Start Search dialog box, and press Enter. 2. Navigate to the following location: HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows > CurrentVersion > Policies > System. 3. Right-click the System folder. 4. Click New, DWORD (32-bit) value. 5. Type in HideFastUserSwitching and press Enter. 6. Click the HideFastUserSwitching value. 7. Type 1 into the Value data box and click OK. 8. Close the Registry Editor window. Disabling Fast User Switching in Windows 8.0 and 8.1 1. Navigate to the Search option. (From the home screen, mouse to the lower right corner and then click the Search icon.) 2. In the search box, type gpedit.msc. Doubleclick the gpedit icon in the Apps pane. The Local Group Policy Editor window will open. 3. Navigate to the following location: Computer Configuration > Administrative Templates > System > Logon. 4. In the Setting pane, double-click Hide entry points for Fast User Switching. 15 Technical Specifications Manual 2014–2015 5. Select Enabled and then click OK. 6. Navigate to the Search option (from the home screen, mouse to the lower right corner and then click the Search icon. 7. In the search box, type run. The Run dialogue box will open. 8. Enter the command gpupdate /force into the text box and then click OK. (Note the space before the backslash.) 9. The Windows system command box will open. When you see the message Computer Policy update has completed successfully, then Fast User Switching has been successfully disabled. 16 Technical Specifications Manual 2014–2015 Enabling Web Fonts in Internet Explorer 10 and 11 If students use Internet Explorer 10 or 11 to access the practice tests, web fonts may need to be enabled in order for some item types to display properly. Enabling Web Fonts in Internet Explorer: 1. Open the Tools menu in Internet Explorer and click Internet Options. The Internet Options window will open. 2. Click the Security tab. 3. Click the Custom Level button. The Security Settings window will open. 4. Scroll to Font Download in the Settings list and click the Enable radio button. 5. Click OK. The Security Settings Window will close. 6. Click OK. The Internet Options window will close. 17 Technical Specifications Manual 2014–2015 Installing Windows Media Pack for Windows 8.1 N and KN Some versions of Windows 8.1 are not shipped with media software installed. As a result, you may need to install software in order for students to listen to audio. Microsoft provides additional information as well as a download package for computers with the following Windows 8.1 versions: Windows 8.1 N Windows 8.1 N/K with Bing Windows 8.1 Enterprise N Windows 8.1 Pro N Windows 8.1 Pro N/K for EDU AIR encourages downloading this software and ensuring it works with sample websites and video and audio files prior to installing the Windows secure browser. Installation instructions are provided on Microsoft’s download page. Microsoft Resources: About the Media Feature Pack for Windows 8.1 N and Windows 8.1 KN Editions: April 2014 (http://support.microsoft.com/kb/2929699/en-us) Download Media Feature Pack for N and KN Versions of Windows 8.1 (http://www.microsoft.com/en-us/download/details.aspx?id=42503) Mac OS X Requirements This section contains information specific to Mac OS X users. These settings can be configured before or after installing the secure browser. 18 Technical Specifications Manual 2014–2015 Disabling Spaces Mac OS X 10.7 through 10.10 includes a Spaces feature that allows running more than one desktop session. This is a security risk because students can potentially start a new desktop session during the test, and use that session to search the Internet for answers. The following procedure explains how to disable Spaces on those versions of OS X. (You can disable Spaces quickly from the command line; see Disabling Spaces and Application Launches from the Command Line for details.) To disable Spaces in Mission Control: 1. Navigate to Apple System Preferences. 2. In System Preferences, click Keyboard. The Keyboard window will be displayed. 3. Click the Keyboard Shortcuts or Shortcuts tab. The Keyboard Shortcuts options will be displayed. 4. In the left panel, click Mission Control. The right panel will show all Mission Control options. 5. In the right panel, clear the following checkboxes: o Move left a space o Move right a space o Switch to Desktop 1 (this may already be unchecked) 19 Technical Specifications Manual 2014–2015 6. To re-enable Spaces, follow steps 1–5 again, and mark the checkboxes for spaces. Function Keys and Application Launches When students use the secure browser for testing, the Test Delivery System conducts regular checks to ensure that other applications are not open. These checks help maintain the integrity of the secure test environment. Some Mac computers are configured to launch iTunes and other applications by pressing the function keys (e.g., F8) on the keyboard. This section contains information on how to prevent the function keys from directly launching applications, including iTunes. This action will help prevent students from accidentally pressing a function key instead of a key in the number row. These instructions are based on Mac 10.9 and should be similar for other supported Macs. To modify the function keys: 1. Open System Preferences. 2. In the Hardware row, click Keyboard. The Keyboard window opens. 3. In the Keyboard window, mark the Use all F1, F2, etc. keys as standard function keys. You should no longer be able to launch applications with just the function keys. If you need to launch iTunes or another application, press the Fn key and then press the desired function key. This combination will launch the application. Important: If a student is testing with the secure browser and presses the Fn key and a function key, this action will open the linked application and result in the test being paused. Source: http://support.apple.com/kb/ht3399 20 Technical Specifications Manual 2014–2015 Disabling Spaces and Application Launches from the Command Line The sections Disabling Spaces and Function Keys and Application Launches describe how to configure OS X through the desktop. This section describes how to perform those configurations from the command line, which can be faster than working through the desktop. To perform this task, you need to be familiar with logging in to OS X machines through Terminal or other terminal emulator. To disable spaces and application launches from the command line: 4. Log in to the machine (remote or local) as the user that runs the secure browser. 5. Enter the following commands: defaults write "{enabled = 0; defaults write "{enabled = 0; }" defaults write "{enabled = 0; }" defaults write "{enabled = 0; }" com.apple.symbolichotkeys AppleSymbolicHotKeys -dict-add 79 value = {parameters = (65535,123, 262144); type = standard; }; }" com.apple.symbolichotkeys AppleSymbolicHotKeys -dict-add 80 value = { parameters = (65535, 123, 393216); type = 'standard'; }; com.apple.symbolichotkeys AppleSymbolicHotKeys -dict-add 81 value = { parameters = (65535, 124, 262144); type = 'standard'; }; com.apple.symbolichotkeys AppleSymbolicHotKeys -dict-add 82 value = { parameters = (65535, 124, 393216); type = 'standard'; }; TIP You can paste these lines into a text file, and run the file from the command line. These commands modify the file ~/Library/Preferences/ com.apple.symbolichotkeys.plist. 6. If you logged in to a computer running OS X 10.8.5 or log out of OS X desktop and then log back in. If you need to restore Spaces and the default application launchers, repeat steps 4–6. In step 5, change enabled = 0 to enabled = 1. Disabling Spaces and Application Launches on Remote Machines The sections Disabling Spaces 21 Technical Specifications Manual 2014–2015 Mac OS X 10.7 through 10.10 includes a Spaces feature that allows running more than one desktop session. This is a security risk because students can potentially start a new desktop session during the test, and use that session to search the Internet for answers. The following procedure explains how to disable Spaces on those versions of OS X. (You can disable Spaces quickly from the command line; see Disabling Spaces and Application Launches from the Command Line for details.) , Disabling Spaces and Application Launches from the Command Line, and Disabling Spaces and Application Launches from the Command Line describe procedures for configuring a secure test environment in OS X. This configuration is stored in the file ~/Library/Preferences/ com.apple.symbolichotkeys.plist. If you have many OS X testing machines, it may be easier to push this file to those machines instead of configuring each one individually. You can push the configuration file to remote machines using a variety of tools, such as the following: File Distributor Apple’s Active Directory Client and Directory Utility Apple’s Open Directory and Profile Manager Centrify & PowerBrokers Identity Enterprise Apple Remote Desktop Linux Requirements This section contains information specific to Linux users. Installing Festival and Sound eXchange (SoX) Software The following two software programs must be installed on Linux machines: Festival and Sound eXchange (SoX). If this software is not installed, students will not be able to hear the audio in the online assessments even when text-to-speech is enabled. To download Festival, click here: http://www.cstr.ed.ac.uk/projects/festival/. To download SoX, click here: http://sox.sourceforge.net. For more information on enabling text-to-speech settings on Linux machines, refer to Section V, Text-to-Speech Requirements, Linux. 22 Technical Specifications Manual 2014–2015 Mobile Requirements This section provides a brief overview of the requirements for student testing on tablets and Chromebooks. Complete instructions are provided in the Secure Browser Installation Manual. The AIRSecureTest mobile secure browsers for iOS and Android tablets and Chromebooks are designed to support a secure testing environment. In addition to installing the secure browser, some device settings may need to be adjusted. iOS Requirements Guided Access Guided Access restricts the iOS to a single application and prevents taking screenshots. This ensures a secure test environment. (You may want to use Single App mode, which is easier to enable and activate than Guided Access; for more details about this configuration, see Configuring Using Autonomous Single App Mode.) The procedure in this section only enables Guided Access; to activate Guided Access before a test, see the Test Administrator User Guide. Enabling Guided Access 1. Tap the Settings icon to open the Settings application. 2. Navigate to General > Accessibility > Learning and tap Guided Access. 23 Technical Specifications Manual 2014–2015 3. Tap Off; it will change to On (enabled). 4. Set the passcode for Guided Access. This passcode is required to deactivate Guided Access after students are finished testing. (If you do not set the passcode now, you will be prompted to set it later.) To set the passcode: a. Tap Set Passcode. b. Enter a passcode. c. Confirm the passcode. (You may want to write down or save this number in a safe place. There is no ability to “retrieve” a forgotten passcode.) Configuring Using Autonomous Single App Mode If you have iOS tablets running version 7.1 or higher, and if you have a Mac running version 10.10 or higher, then you can use Autonomous Single App Mode (ASAM) to quickly create a secure testing environment on all iPads used for testing. (Tablets running a version earlier than 7.1 require Guided Access; for details about this configuration, see Enabling Guided Access.) Compared to Guided Access, ASAM requires less time to prepare for test sessions; there is no need to activate Guided Access on each iPad before each test session. Overview of Autonomous Single App Mode and the Secure Testing Environment To manage multiple iPads using ASAM, you need the do the following: Step 1: Creating a Mobile Device Management Profile Step 1a (Optional): Restricting Features in iOS 8.1.3 24 Technical Specifications Manual 2014–2015 Step 1a (Optional): Restricting Features in iOS 8.1.3 You can restrict features in supervised iOS 8.1.3 devices that may give students an unfair testing advantage, including the dictionary, predictive keyboard, spell check, and auto-correction. If you wish to restrict any of these features, you may do so when creating the MDM profile for these devices. Note: The current version of Apple Configurator does not allow you to restrict these features. If you wish to restrict these features when configuring the MDM profile, you must use a thirdparty MDM solution. To restrict features in iOS 8.1.3 devices: In the Custom Settings section of the MDM solution, insert the profile key for each feature you wish to restrict. Table 6 provides a list of the relevant profile keys. Table 6. Profile Keys for iOS 8.1.3 Features Feature Profile Key Recommended Value Dictionary <key>allowDefinitionLookup </key> False Predictive Keyboard <key>allowPredictiveKeyboa rd</key> False Spell Check <key>allowSpellCheck</key> False Auto-Correction <key>allowAutoCorrection</ key> False The following snippet turns off the iPad’s auto-correction feature. The snippets for dictionary, predictive keyboard, and spell check are similar. <dict> <key>allowAutoCorrection</key> <false /> <key>PayloadDisplayName</key> <string>Restrictions</string> <key>PayloadDescription</key> <string>RestrictionSettings</string> <key>PayloadIdentifier</key> <string>31eb53ac-3a08-46f7-8a0a-82e872382e15.Restrictions</string> <key>PayloadOrganization</key> <string></string> <key>PayloadType</key> <string>com.apple.applicationaccess</string> <key>PayloadUUID</key> <string>56199b2c-374d-4152-bc50-166d21fa9152</string> <key>PayloadVersion</key> <integer>1</integer> </dict> 25 Technical Specifications Manual 2014–2015 Step 2: Creating a Supervisory Profile Step 3: Placing iPads in Autonomous Single App Mode After completing these three steps, each time a student starts a test, the iPad enters ASAM and the test environment is secure. Step 1: Creating a Mobile Device Management Profile The first step in provisioning iPads with ASAM is to create an MDM profile. All default profile settings are compatible. However, you may wish to restrict certain features in iOS 8.1.3 devices (see Step 1a (Optional): Restricting Features in iOS 8.1.3). Deploy the profile to a host that the iPads can access. Creating an MDM profile is beyond the scope of this specification manual. The following references provide introductory information: IT in the Classroom, available at https://www.apple.com/education/it/mdm/. Apple Configurator Help, available at https://help.apple.com/configurator/mac/1.0/#. Pro tip: Use OS X Server Profile Manager for MDM, available at http://www.techrepublic.com/article/pro-tip-use-os-x-server-profile-manager-for-mdm/. 26 Technical Specifications Manual 2014–2015 Step 1a (Optional): Restricting Features in iOS 8.1.3 You can restrict features in supervised iOS 8.1.3 devices that may give students an unfair testing advantage, including the dictionary, predictive keyboard, spell check, and auto-correction. If you wish to restrict any of these features, you may do so when creating the MDM profile for these devices. Note: The current version of Apple Configurator does not allow you to restrict these features. If you wish to restrict these features when configuring the MDM profile, you must use a thirdparty MDM solution. To restrict features in iOS 8.1.3 devices: In the Custom Settings section of the MDM solution, insert the profile key for each feature you wish to restrict. Table 6 provides a list of the relevant profile keys. Table 6. Profile Keys for iOS 8.1.3 Features Feature Profile Key Recommended Value Dictionary <key>allowDefinitionLookup </key> False Predictive Keyboard <key>allowPredictiveKeyboa rd</key> False Spell Check <key>allowSpellCheck</key> False Auto-Correction <key>allowAutoCorrection</ key> False The following snippet turns off the iPad’s auto-correction feature. The snippets for dictionary, predictive keyboard, and spell check are similar. <dict> <key>allowAutoCorrection</key> <false /> <key>PayloadDisplayName</key> <string>Restrictions</string> <key>PayloadDescription</key> <string>RestrictionSettings</string> <key>PayloadIdentifier</key> <string>31eb53ac-3a08-46f7-8a0a-82e872382e15.Restrictions</string> <key>PayloadOrganization</key> <string></string> <key>PayloadType</key> <string>com.apple.applicationaccess</string> <key>PayloadUUID</key> <string>56199b2c-374d-4152-bc50-166d21fa9152</string> <key>PayloadVersion</key> <integer>1</integer> </dict> 27 Technical Specifications Manual 2014–2015 Step 2: Creating a Supervisory Profile To create a supervisory profile: 1. On a Mac 10.10, download and install Apple Configurator from the Mac App Store. When the installation completes, open Apple Configurator. 2. Click Prepare, then Settings. The Settings window appears. Figure 1. Settings Window in Apple Configurator 28 Technical Specifications Manual 2014–2015 3. Click + below the Profiles list and select Create New Profile…. A configuration window appears. 4. In the General section, in the Name field, enter a name for the profile. 5. In the Restrictions section, click Configure. A list of restrictions appears. 6. Make any required changes to the restrictions, or retain the defaults settings. 7. Click Save. You return to the Settings tab, and the profile appears in the Profiles list. 8. Click to export the profile to the Mac. Creation of the supervisory profile is complete. Step 3: Placing iPads in Autonomous Single App Mode TIP: Installing on multiple iPads at once Before starting this procedure, connect the iPads to the Mac through a USB hub. That way you can perform the installation on many of them at one time. To install the MDM profile, supervisory profile, and secure browser: 1. On the Mac where you performed 29 Technical Specifications Manual 2014–2015 2. Step 1a (Optional): Restricting Features in iOS 8.1.3 You can restrict features in supervised iOS 8.1.3 devices that may give students an unfair testing advantage, including the dictionary, predictive keyboard, spell check, and auto-correction. If you wish to restrict any of these features, you may do so when creating the MDM profile for these devices. Note: The current version of Apple Configurator does not allow you to restrict these features. If you wish to restrict these features when configuring the MDM profile, you must use a thirdparty MDM solution. To restrict features in iOS 8.1.3 devices: In the Custom Settings section of the MDM solution, insert the profile key for each feature you wish to restrict. Table 6 provides a list of the relevant profile keys. Table 6. Profile Keys for iOS 8.1.3 Features Feature Profile Key Recommended Value Dictionary <key>allowDefinitionLookup </key> False Predictive Keyboard <key>allowPredictiveKeyboa rd</key> False Spell Check <key>allowSpellCheck</key> False Auto-Correction <key>allowAutoCorrection</ key> False The following snippet turns off the iPad’s auto-correction feature. The snippets for dictionary, predictive keyboard, and spell check are similar. <dict> <key>allowAutoCorrection</key> <false /> <key>PayloadDisplayName</key> <string>Restrictions</string> <key>PayloadDescription</key> <string>RestrictionSettings</string> <key>PayloadIdentifier</key> <string>31eb53ac-3a08-46f7-8a0a-82e872382e15.Restrictions</string> <key>PayloadOrganization</key> <string></string> <key>PayloadType</key> <string>com.apple.applicationaccess</string> <key>PayloadUUID</key> <string>56199b2c-374d-4152-bc50-166d21fa9152</string> <key>PayloadVersion</key> <integer>1</integer> </dict> 30 Technical Specifications Manual 2014–2015 3. Step 2: Creating a Supervisory Profile, open the Apple Configurator. 4. From the Apple Configurator menu, select Preferences. The Preferences window opens. 5. Under General, clear the Automatically refresh and Remove apps and profiles Configurator did not install checkboxes. 6. Close the Preferences window. 7. Back in Apple Configurator, click Prepare, then Settings. The Settings window appears (see Figure 1). 8. In the Name field, enter a name to apply to the iPads. 9. Optional: Mark the Number sequentially starting at 1 checkbox. This adds a number to each iPad’s name. For example, if the Name field is Garden Elementary School, and if three iPads are connected, each device receives the name Garden Elementary School 1, Garden Elementary School 2, and Garden Elementary School 3. 10. Set Supervision to On. 31 Technical Specifications Manual 2014–2015 11. Click Organization Info… The Organization Info window appears. 12. In the Organization field, enter Ohio Online and then click Done. The Organization Info window closes. 13. If the profile you created in 32 Technical Specifications Manual 2014–2015 14. Step 1a (Optional): Restricting Features in iOS 8.1.3 You can restrict features in supervised iOS 8.1.3 devices that may give students an unfair testing advantage, including the dictionary, predictive keyboard, spell check, and auto-correction. If you wish to restrict any of these features, you may do so when creating the MDM profile for these devices. Note: The current version of Apple Configurator does not allow you to restrict these features. If you wish to restrict these features when configuring the MDM profile, you must use a thirdparty MDM solution. To restrict features in iOS 8.1.3 devices: In the Custom Settings section of the MDM solution, insert the profile key for each feature you wish to restrict. Table 6 provides a list of the relevant profile keys. Table 6. Profile Keys for iOS 8.1.3 Features Feature Profile Key Recommended Value Dictionary <key>allowDefinitionLookup </key> False Predictive Keyboard <key>allowPredictiveKeyboa rd</key> False Spell Check <key>allowSpellCheck</key> False Auto-Correction <key>allowAutoCorrection</ key> False The following snippet turns off the iPad’s auto-correction feature. The snippets for dictionary, predictive keyboard, and spell check are similar. <dict> <key>allowAutoCorrection</key> <false /> <key>PayloadDisplayName</key> <string>Restrictions</string> <key>PayloadDescription</key> <string>RestrictionSettings</string> <key>PayloadIdentifier</key> <string>31eb53ac-3a08-46f7-8a0a-82e872382e15.Restrictions</string> <key>PayloadOrganization</key> <string></string> <key>PayloadType</key> <string>com.apple.applicationaccess</string> <key>PayloadUUID</key> <string>56199b2c-374d-4152-bc50-166d21fa9152</string> <key>PayloadVersion</key> <integer>1</integer> </dict> 33 Technical Specifications Manual 2014–2015 15. Step 2: Creating a Supervisory Profile does not appear in the Profiles list, import it by doing the following: a. Click + below the Profiles list and select Import Profile…. b. Navigate to the profile you saved in step 8 on page 28, and then click Open. 16. Mark the checkbox for the profile you want to prepare onto the iPads (see Figure 1). 17. Connect each iPad to the Mac via a USB cable or USB hub. 18. On each connected iPad, uninstall any existing versions of the secure browser. 19. In the Apple Configurator, under the Prepare tab, click Prepare at the bottom of the window. A confirmation message appears. 20. Click Apply in the confirmation message. Preparation starts and may take several minutes, after which the iPad restarts. The Apple Configurator displays progress messages during the prepare. Note: iOS Upgrade Apple Configurator may force the iPads to upgrade to the latest version of iOS. 21. After the iPad restarts, follow the prompts on the iPad to configure it until the home screen appears. 22. Optional: Confirm the supervisory profile is installed on the iPad. Go to Settings > General > Profiles. The profile name you used in step 4 on page 28 appears under Configuration Profiles. 23. On the iPad, download and install the MDM profile you created in Step 1: Creating a Mobile Device Management Profile. 34 Technical Specifications Manual 2014–2015 24. After the MDM profile installation completes, install the secure browser onto the iPad. You can take a copy of the secure browser for iOS from http://oh.portal.airast.org/ocba/. (Detailed instructions for installing the secure browser are in the section “Installing the Secure Browser on iOS” of the Secure Browser Installation Manual.) 25. Optional: After installation completes, test it by doing the following: a. Open the Secure Browser. b. Log into a test site. c. Select a test, have the TA approve the test. d. Start the test. The iPad enters ASAM. 26. Repeat steps 17–25 to prepare additional iPads. 27. In the Apple Configurator, click Stop and close the Apple Configurator. Setting the iPad into ASAM is complete. When a student starts a test, the iPad enters ASAM mode. Android Requirements The mobile secure browser for Android tablets requires the secure browser keyboard to be selected before students can access the login page. The reason for this is that the default Android keyboard allows predictive text, which would unduly aid students when entering written responses to test items. The secure browser keyboard is a basic keyboard, with no row for predictive text functionality. The first time you open the Mobile Secure Browser on an Android tablet, you will be prompted to select the secure browser keyboard. Instructions for enabling the secure browser keyboard follow. About the Secure Browser Keyboard and General Settings Once the secure browser keyboard is set, it becomes the default keyboard for all Android tablet applications, not just the secure browser. If you want to return to the default Android keyboard after using the secure browser, you will need to navigate to Settings > Language & Input and uncheck the secure browser keyboard. If you change back to the default Android keyboard, you will be prompted to select the secure browser keyboard the next time you open the secure browser. The secure browser will not allow you to access the student login page until the secure browser keyboard has been selected. 35 Technical Specifications Manual 2014–2015 Enabling the Secure Browser Keyboard Note: All screenshots in this section were taken with a Samsung Galaxy Tab 2. 1. Select the secure browser icon on the home screen. 2. You will be prompted to change the keyboard. Select Close. 3. Select Set up input methods. The Language and Input settings screen will automatically open. 4. Select the checkbox next to AIRSecureTest so that a checkmark appears. 5. You will be prompted to acknowledge that this selection is okay. Select OK to continue. Note: This action allows the mobile secure browser to use the secure browser keyboard. 6. Navigate to the secure browser to open it. (You can use the application switcher or go back to “Home” and select the secure browser icon.) 7. You will be prompted to change the keyboard. Select Close. 36 Technical Specifications Manual 2014–2015 8. The Android tablet’s default keyboard will still be selected. 9. Select the checkmark or circle for the AIRSecureTest keyboard. 10. Select Continue. You will be prompted to complete the application launch using the preferred method. 11. Select AIRSecureTest (ensure it is shaded and highlighted blue) and then select Always. 12. You will need to acknowledge that the secure browser’s default settings have changed. (This is a result of selecting the secure browser keyboard.) 13. Select OK. Chrome OS Requirements The American Institutes for Research has worked with Google to develop a secure browser kiosk application that can be downloaded onto Chromebooks from the Chrome Web Store. Using the AIRSecureTest kiosk application requires Chromebooks to run in kiosk mode. About the AIRSecureTest Kiosk App The AIRSecureTest browser is not a hosted app. In order to support all test features, AIR developed a packaged kiosk application. As a result, this app must be deployed onto managed Chromebooks via the Chrome Management Console as a kiosk application rather than via a public session. (You may still use public sessions for other applications.) 37 Technical Specifications Manual 2014–2015 Instructions for installing the kiosk application are in the Secure Browser Installation Manual. Google Documentation The following references are for users who need to ensure that managed Chromebooks are configured correctly prior to installing the AIRSecureTest kiosk app. Managed Chromebooks Using Chromebooks for Student Assessments (https://support.google.com/chrome/a/answer/3273084) o Refer to “Scenario 1: School sets up Chromebook to run as a Single App Kiosk running the exam app.” o Do NOT follow the instructions for Scenarios 2 and 3. Managing Device Settings (https://support.google.com/chrome/a/answer/1375678) Non-Managed Chromebooks Non-managed Chromebooks must not already be configured with user accounts before you enable kiosk mode. If you have already added user accounts to Chromebooks, you will need to wipe the devices. Google has provided instructions for wiping Chromebooks: https://support.google.com/chrome/a/answer/1360642?hl=en. After you wipe the Chromebooks, follow the instructions in the Secure Browser Installation Manual to enable kiosk mode and install the AIRSecureTest app. 38 Technical Specifications Manual 2014–2015 Section III. Text-to-Speech Requirements This section contains information about text-to-speech requirements. Overview of Text-to-Speech Using text-to-speech requires at least one voice pack to be pre-installed on computers that will be used for testing. For Windows, Mac, Android, and Chrome operating systems, default voice packs are typically pre-installed. For computers running a Linux distribution, voice packs may need to be downloaded and installed. A number of voice packs are available for desktop computers, and AIR researches and tests voice packs for compatibility with the secure browsers. Additionally, not all voice packs that come pre-installed with operating systems are approved for use with online testing. The voice packs listed at the end of this section have been tested and are whitelisted by the secure browser. Using Text-to-Speech Students using text-to-speech for the practice tests must log in using a supported secure browser. Students can also verify that text-to-speech works on their computers by logging in to a practice test session and selecting text-to-speech on the Choose Settings screen. Note: We strongly encourage schools to test the text-to-speech settings before students take operational tests. You can check these settings by taking a practice test using the secure browser or app, and selecting the Text To Speech option on the Choose Settings page while signing in. How the Secure Browsers Work With Voice Packs Desktop Secure Browsers The secure browsers are configured to recognize several known voice packs to provide the textto-speech accommodation. The secure browsers detect pre-installed voice packs on the students’ machines. When a student who is using text-to-speech logs in to a test session and has been approved for testing, the secure browser will look for voice packs on the student’s machine. When it recognizes an approved voice pack, the one with the highest priority rating will be used. If any of the approved voice packs has also been set as the default voice on the computer, then that voice pack will always get the highest priority. 39 Technical Specifications Manual 2014–2015 Mobile Secure Browsers The mobile secure browser uses either the device’s native voice pack or a voice pack embedded in the secure browser. If additional voice packs are downloaded to a tablet or Chromebook, they will not be recognized by the mobile secure browser. iOS Mobile Secure Browser version 2.2 iOS 6.0–6.1: The embedded NeoSpeech voice pack will be used. iOS 7.0–8.1: The native iOS voice pack will be used. Android The AIRSecureTest app for Android uses the native voice pack available on the supported Android tablet being used. Chrome OS The AIRSecureTest kiosk app for Chromebooks uses the native voice pack available on the Chromebook device being used. About NeoSpeech™ Voice Packs for Windows Pursuant to an agreement between NeoSpeech™ and the American Institutes for Research (AIR), authorized users may download and install specific licensed NeoSpeech™ voice packs for use on supported Windows computers (Windows XP Service Pack 3, Vista, 7, 8.0, and 8.1). These voice packs can be used instead of the default Windows voice packs for English and the commercial Spanish voice packs from Cepstral. (The default Windows voice packs as well as the Cepstral voice packs for Windows may still be used for text-to-speech, if desired.) The Julie voice pack is for English text-to-speech users. The Violeta voice pack is for Spanish text-to-speech users. The NeoSpeech™ voice pack is to be used only in conjunction with, and not separate from, the online assessments provided by AIR's Test Delivery System. The NeoSpeech™ voice packs can be downloaded from TIDE. Installation instructions are also available in TIDE. 40 Technical Specifications Manual 2014–2015 Windows Text-to-Speech Settings This section explains how to configure Windows for using text-to-speech with the secure browser. The text-to-speech feature is available on Windows versions as listed in the Online System Requirements for Ohio Science and Social Studies Tests. The instructions in this section are for Windows 7. The process is similar for other versions of Windows. 1. Open the Control Panel window, and select Speech Recognition. 2. In the Speech Recognition window, select Text to Speech. 3. Configure default text-to-speech preferences. a. Voice selection: If multiple voice packs are available, select the default voice. b. Select Preview Voice to see whether the selected voice requires a rate adjustment. c. Voice speed: If necessary, adjust the voice speed. Drag the slider to make the voice speak slower or faster. To listen to the rate, select Audio Output. d. When you are done, click OK to save your settings and then close the Speech Properties window. 41 Technical Specifications Manual 2014–2015 Mac OS X Text-to-Speech Settings This section explains how to configure Mac OS X for using text-to-speech with the secure browser. The text-to-speech feature is available on OS X versions as listed in the Online System Requirements for Ohio Science and Social Studies Tests. The instructions in this section are for OS X 10.9. The process is similar for other versions of OS X. 1. Open System Preferences, and select Dictation & Speech. 2. In the Text to Speech section, configure your default text-to-speech preferences. o System Voice: If multiple voice packs are available, select the default voice. o Select Play to see whether the selected voice requires a rate adjustment. o Speaking Rate: If necessary, adjust the voice speed. Drag the slider to make the voice speak slower or faster. To listen to the rate, select Play. o When you are done, click the red X in the upper left corner to save your settings and close the Speech window. 42 Technical Specifications Manual 2014–2015 Linux Text-to-Speech Settings This section explains how to install voice packs on the supported Linux distributions. 1. Install Festival for text-to-speech: o Ubuntu: sudo apt-get install festival o Fedora, RedHat: yum install festival o openSUSE: zypper install festival 2. Install SoX for text-to-speech: o Ubuntu: sudo apt-get install sox o Fedora, RedHat: yum install sox o openSUSE: zypper install festival 3. Using Table 7 as a reference, install voice packs from the indicated packages. (These are the supported voice packs.) Table 7. Packages that Include Supported Voice Packs on Linux Distributions Distribution/Voice Pack Available in Package Ubuntu kal_diphone (Kevin American English male) festvox-kallpc16k, festvox-kallpc8k ked_diphone (Kurt American English male) festvox-kdlpc16k, festvox-kdlpc8k el_diphone (Castilian Spanish male) festvox-ellpc11k openSuse kal_diphone (Kevin American English male) (included in festival) Fedora, RedHat cmu_us_awb_arctic_hts (Scottish English male) festvox-awb-arctic-hts cmu_us_bdl_arctic_hts (American English male) festvox-bdl-arctic-hts cmu_us_jmk_arctic_hts (Canadian English male speaker) festvox-jmk-arctic-hts kal_diphone (Kevin American English male) festvox-kal-diphone ked_diphone (Kurt American English male) festvox-ked-diphone 43 Technical Specifications Manual 2014–2015 Voice Packs Recognized by Desktop Secure Browsers The tables in this section display the voice packs for each desktop operating system (Windows, Mac, and Linux) that are currently recognized by the secure browser. Windows and Mac OS X computers typically ship with at least one default voice pack. Many of these default voice packs are recognized by the secure browser. Windows Table 8. Voice Packs Recognized by Secure Browsers—Windows Vendor Voice Pack Language Windows (pre-installed) Julie English Windows (pre-installed) Kate English Windows (pre-installed) Michael English Windows (pre-installed) Michelle English Windows (pre-installed) MSAnna English Windows (pre-installed) MS_EN-GB_HAZEL English Windows (pre-installed) MS_EN-US_DAVID English Windows (pre-installed) MS_EN-US_ZIRA English Windows (pre-installed) MSMary English Windows (pre-installed) MSMike English Windows (pre-installed) MSSam English Windows (pre-installed) Paul English Windows (pre-installed) Violeta Spanish Cepstral (commercial) Cepstral_David English Cepstral (commercial) Cepstral_Marta Spanish Cepstral (commercial) Cepstral_Miguel Spanish NeoSpeech (commercial) VW Julie English NeoSpeech (commercial) VW Violeta Spanish 44 Technical Specifications Manual 2014–2015 Mac OS X Table 9. Voice Packs Recognized by Secure Browsers—Mac OS X Vendor Voice Pack Language Mac (pre-installed) Agnes English Mac (pre-installed) Alex English Mac (pre-installed) Bruce English Mac (pre-installed) Callie English Mac (pre-installed) David English Mac (pre-installed) Fred English Mac (pre-installed) Jill English Mac (pre-installed) Junior English Mac (pre-installed) Kathy English Mac (pre-installed) Princess English Mac (pre-installed) Ralph English Mac (pre-installed) Samantha English Mac (pre-installed) Tom Spanish Mac (pre-installed) Vicki English Mac (pre-installed) Victoria English Mac (pre-installed) Diego Spanish Mac (pre-installed) Javier Spanish Mac (pre-installed) Marta Spanish Mac (pre-installed) Monica Spanish Mac (pre-installed) Paulina Spanish Infovox (commercial) Heather Infovox iVox HQ English Infovox (commercial) Rosa Infovox iVox HQ Spanish 45 Technical Specifications Manual 2014–2015 Linux Table 10. Voice Packs Recognized by Secure Browsers—Linux Vendor Voice Pack Language Festvox (commercial) cmu_us_awb_arctic_hts English Festvox (commercial) cmu_us_bdl_arctic_hts English Festvox (commercial) cmu_us_jmk_arctic_hts English Festvox (commercial) cmu_us_slt_arctic_hts English Festvox (commercial) kal_diphone English Festvox (commercial) ked_diphone English 46 Technical Specifications Manual 2014–2015 Appendix A. Systems and URLs Provided by AIR This appendix provides information about the URLs for each system that AIR provides. Non-Testing Sites System URL Portal and secure browser installation files oh.portal.airast.org Single Sign On System oh.sso.airast.org Test Information Distribution Engine oh.tide.airast.org Online Reporting System oh.ors.airast.org Testing Sites TA and Student Testing Sites The Test Administrator and student testing sites use a cloud-based satellite system for optimal load balancing during testing. This includes the operational sites (TA Interface and Student Testing Site) and practice sites (TA Practice Site and Practice Test Site). Testing servers and satellites may be added or modified during the school year to ensure an optimal testing experience. As a result, AIR strongly encourages you to whitelist at the root level. This requires using a wildcard. System URL TA and Student Testing Sites *.tds.airast.org 47 Technical Specifications Manual 2014–2015 Appendix B. Technology Coordinator Checklist You can use this checklist during review of networks and computers used for testing. Activity Target Completion Date Reference Verify that all of your school’s computers that will be used for online testing meet the operating system requirements. 3–4 weeks before testing begins in your school Online System Requirements for Ohio Science and Social Studies Tests Verify that your school’s network and Internet are properly configured for testing, conduct network diagnostics, and resolve any issues. 3–4 weeks before testing begins in your school Network and Internet Requirements Install the secure browser on all computers that will be used for testing. 3–4 weeks before testing begins in your school Secure Browser Installation Manual Enable pop-up windows and review software requirements for each operating system. 1–2 weeks before testing begins in your school General Software Requirements On Windows computers, disable Fast User Switching. 1–2 weeks before testing begins in your school Disabling Fast User Switching On Mac 10.7—10.10 computers, disable Spaces in Mission Control. 1–2 weeks before testing begins in your school Disabling Spaces Install and verify any required text-to-speech software onto computers that will be used for testing. 1–2 weeks before testing begins in your school Text-to-Speech Requirements On iPads, Androids and Chromebooks, complete the Launchpad step. 1–2 weeks before testing begins in your school Secure Browser Installation Manual On iPads, ensure that Guided Access or ASAM is enabled and that TAs know how to activate Guided Access. 1–2 weeks before testing begins in your school Enabling Guided Access On Android tablets, ensure that the secure browser keyboard is enabled. 1–2 weeks before testing begins in your school Enabling the Secure Browser Keyboard If a student can access multiple user accounts on a single computer, you are encouraged to disable the Fast User Switching function. 48 Technical Specifications Manual 2014–2015 Appendix C. User Support If this document does not answer your questions, please contact the Ohio Help Desk. The Help Desk will be open Monday–Friday from 7:00 a.m. to 5:00 p.m. (except holidays). Ohio Help Desk Toll-Free Phone Support: 1-877-231-7809 Email Support: OHHelpDesk@air.org If you contact the Help Desk, you will be asked to provide as much detail as possible about the issues you encountered. Include the following information: Test Administrator name and IT/network contact person and contact information SSIDs of affected students Results ID for the affected student tests Operating system and browser version information Any error messages and codes that appeared, if applicable Information about your network configuration: o Secure browser installation (to individual machines or network) o Wired or wireless Internet network setup 49